IoT botnet discovered exploiting online devices & IP cameras

Researchers have discovered a large “Internet of Things” (IoT) botnet with similarities to Mirai.
Known as “IoT Troop” or “Reaper”, this threat targets IoT devices by exploiting vulnerabilities on internet connected devices such as IP cameras and consumer grade routers. Compromised devices could be used to support Distributed Denial of Service attacks (DDoS) against targets worldwide. While this botnet appears to be in the early stages of formation, organisations are encouraged to review denial of service strategies with service providers.
Recommended Actions
1. Review internal denial of service strategies. Have a plan in place in the event of a denial of service attack.
2. Discuss denial of service strategies with service providers. Understand their capacity to withstand attacks, responsive actions and associated costs.
In the event of an attack
1. Traffic diversion to a dedicated DDoS Mitigation service using BGP or DNS based routing.
2. In-line filtering, using a hardware appliance such as Web Application Firewalls (WAFs). This will provide protection against application-layer attacks.
3. Identifying and disabling the attack vector(s). This may involve disabling vulnerable services or removing large files from online services.
In mid-September 2017, researchers at Qihoo 360 and Check Point reported an increase in attacks against IoT devices. Similarly, eSentire has observed an upward trend in attacks targeting IoT. Unlike past botnets, strong passwords will not be enough keep devices safe from infection, as Reaper targets manufacturer vulnerabilities. There is currently no known target for the Reaper botnet, but it can be expected that DDoS attacks would likely target DMZ exposed assets as well as cloud-hosted services.
For more information, visit esentire.com

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Cloud, AI, and Integration: Rhombus on What’s Next in Physical Security

Garrett Larsson, Co-Founder and CEO of Rhombus Systems, explores how cloud, AI, and…
Copyright: Security Buyer

Facial Recognition: Innovation vs. Accountability

Facial recognition technology is advancing with AI, IoT, and privacy-first security, but regulatory compliance, ethical AI, accountability…
ICT

ICT & Milestone unified with new integrations

Integrated Control Technology (ICT) has released paired integrations between Protege GX, and Milestone’s XProtect platforms…
Hanwha

Hanwha Vision and Immix bolster integration

Hanwha Vision and Immix have enhanced their longstanding partnership with a deeper integration that supports industry-leading AI analytics
Sunstone Systems

Design Risk Assessment for Solar-Powered Surveillance

Liam Cornish, Head of Technical Operations at Sunstone Systems talks about how the design of solar-powered surveillance and…
SESIP

GlobalPlatform to support SESIP IoT evaluation standard

In response to the growing uptake of GlobalPlatform’s Security Evaluation Standard for IoT Platforms (SESIP) methodology, the organization…
IoT

IoT: Secure and Connected

Hannah Larvin, Features Editor of Security Buyer explores how IoT is transforming security with advanced integration and interoperability…
Dallmeier

Professional Mobile Video Management “in your Pocket”

Dallmeier introduces the SeMSy Mobile Client, a product designed for the user experience, functionality and simplicity for the end user 

Defensive AI safeguards against cyber threats

Defense Initiative to enhance global cybersecurity underscores the importance of defending against increasingly sophisticated and pervasive cyber threats…
Kingdom

Demand for temporary CCTV towers rises

Demand for temporary CCTV towers rises after surge in professional gangs targeting construction sites, says Kingdom Systems.
Scroll to Top